s4dr0t1 / assemblyShenanigansLinks
My attempt to teach others about microprocessors and programming in IA-32 and IA-64 assembly, and to spread the word of how awesome it is.
☆29Updated 2 years ago
Alternatives and similar repositories for assemblyShenanigans
Users that are interested in assemblyShenanigans are comparing it to the libraries listed below
Sorting:
- Some basic info, resources, and code snippets about windows kernel exploitation☆14Updated 2 years ago
- Stub for polymorphic code☆12Updated 2 years ago
- A PE parser written in C++ which does not uses OOP. Helpful if you want to learn about PE parsing.☆17Updated 2 years ago
- ☆33Updated 2 years ago
- WinREPL is a "read-eval-print loop" shell on Windows that is useful for testing/learning x86 and x64 assembly.☆16Updated 2 years ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆62Updated 3 years ago
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆40Updated 10 months ago
- ☆16Updated 3 weeks ago
- Get started with writing your first ever Windows Driver☆33Updated last year
- A Linux x86/x86-64 tool to trace registers and memory regions.☆38Updated 2 years ago
- Cheat sheet of binary protections flags☆25Updated 4 years ago
- Rust out-of-tree Linux Kernel Modules (LKMs) experimentation framework☆46Updated last year
- Repository contains shellcodes made from scratch for intel x86-64 bit Architecture☆12Updated 2 years ago
- Creating a Bind Shell in C☆18Updated last year
- x86_64 LKM linux rootkit☆16Updated last year
- A series of writes about “Binary Exploitation”.☆85Updated last year
- Binary Golf Grand Prix☆57Updated 2 months ago
- Compiler for the Jack Programming Language☆17Updated 7 months ago
- Proof of Concept example for abusing Process Hacker 2 (v2.39.124)☆21Updated 7 months ago
- The book and code repo for the FREE Fundamental C++ book by Kevin Thomas.☆18Updated 2 years ago
- Image Steganography In C Language.☆46Updated 8 years ago
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆45Updated 3 years ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆36Updated 5 months ago
- Notes template for Offensive Security's EXP-301 course and OSED exam☆18Updated 3 years ago
- The Intel 8080 ("eighty-eighty") is the second 8-bit microprocessor designed and manufactured by Intel.☆15Updated 3 years ago
- x86 OS development using Bochs emulator. MIT xv6, JamesM's kernel development tutorials (with some changes) & more☆82Updated last year
- DC540 hacking challenge 0x00001.☆26Updated last year
- Slides about HyperDbg☆30Updated 2 months ago
- CMU Systems Programming course resources incl. course website, labs, schedule, & extra material. Books: "Computer Systems: A Programmer's…☆34Updated last year
- ☆48Updated last year